Cyber Security|Cryptography|ROT13 SECURITY |TOOLS| Challenge

rotate by 13 places

>FBPVNY-RATVARRE GBBYXVG

SOCIAL-ENGINEER TOOLKIT

>GPCQHZC

>tcpdump

>NVEPENPX-AT

aircrack-ng

>ZRGNFCYBVG

Metasploit framework

>AZNC

nmap

>qveo

dirb

>Ohec Fhvgr

Burp Suite

>pehapu

crunch

>znppunatre

macchanger

>argqvfpbire

netdiscover

>unfuqrrc

hashdeep

>jverfunex

Wireshark

--

--

--

InfoSec Writer/Instructor/Custom Course Creator Bug Bounty Hunter Penetration Tester

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Harry Buidler and the Grimoire of DeFi

SSRF External Service Interaction for Find Real IP CloudFlare and Leads to SQL Injection

Meteor Blind NoSQL Injection

Security for Security: Why its important to use Adaptive Data Protection to protect security data…

{UPDATE} Скажи Слово Hack Free Resources Generator

Why installing software updates makes us WannaCry

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Akash Ranjan Patel

Akash Ranjan Patel

InfoSec Writer/Instructor/Custom Course Creator Bug Bounty Hunter Penetration Tester

More from Medium

Migrate a Flask site from EC2 to S3 + CloudFront, in 7 easy steps

Setting up CI/CD with AWS CodePipeline

Recap: Cloudride — AWS Summit Tel Aviv 2022

How to push logs to ElasticSearch and Cloudwatch from ECS-fargate using FluentBit?